After successfully completing this program, the student will be able to perform the following:
This certificate program is part of the E-Business Technology AS degree program (1552120107). At the completion of this program, the student will be able to:
|
-
Design, develop and implement physical, network, host, application and user security systems for e-business. ̶ The student will be able to:
|
-
Explain use and purpose of security policies.
|
-
Conduct a security audit.
|
-
Control access to systems, resources and data.
|
-
Explain and manage system security in common Operating Systems.
|
-
Describe concepts of web servers and their role in the network.
|
-
Plan and implement a web server.
|
-
Identify the various hardware and software requirements for a web server.
|
-
Explain how documents and files are stored on a web server.
|
-
Describe different methods for projecting future traffic on a web server.
|
-
Identify the necessary steps to ensure reliability and response of the server.
|
-
Describe and implement the process for effectively organizing a web site.
|
-
Install, configure, and maintain a Web server.
|
-
Publish a web document so that it is easily located through various search engines on the Internet.
|
-
Set up the web server so that dynamic content can be provided to users of the web site.
|
-
Perform corrective and preventative maintenance on a web server.
|
-
Analyze server log files to determine trends in web server utilization.
|
-
Discuss Internet services operation and the security risk imposed by them on the network.
|
-
Identify vulnerabilities in World Wide Web protocols and counter-measures for securing them.
|
-
Describe the operation of electronic mail and news services protocols and how to effectively secure them.
|
-
Describe the operation of file transfer and printing service protocols and how to effectively secure them.
|
-
Describe the operation of remote access services protocols and how to effectively secure them.
|
-
Describe the operation of real-time conferencing service protocols and how to effectively secure them.
|
-
Properly configure and describe the operation of naming and directory services.
|
-
Describe the operation of authentication and auditing services protocols and how to effectively secure them.
|
-
Describe the operation of administrative services protocols and how to effectively secure them.
|
-
Describe the operation of the IP Security protocol.
|
-
Implement effective measures to secure various service protocols.
|
-
Maintain and monitor security policies. ̶ The student will be able to:
|
-
Identify basic network security.
|
-
Describe purpose and use of packet sniffing, firewalls and proxies.
|
-
Define web server security.
|
-
Protect against the risks of directory browsing.
|
-
Assess client security issues including ActiveX, JavaScript and Cookies.
|
-
Install and configure network security tools.
|
-
Explain the strengths, and weaknesses of cryptography as a security tool.
|
-
Describe authentication and identification schemes.
|
-
Define secure software.
|
-
Describe the use and purpose of encryption.
|
-
Define the advantages of Secure Socket Layer (SSL).
|
-
Define certificate authority.
|
-
Identify basic aspects of intrusion detection and steps to protect the web server from these threats.
|
-
Explain the history of cryptographic methodology.
|
-
Describe cryptographic attack models.
|
-
Describe the secret key and public key encryption methodology.
|
-
Use hashing techniques.
|
-
Use digital signatures in a network environment.
|
-
Explain applied cryptography.
|
-
Use authentication processes in heterogeneous environments.
|
-
Create secure environment through defensive programming.
|
-
Explain the basic elements of Security Testing and Auditing.
|
-
Describe the capabilities of effective signature filter techniques.
|
-
Explain the importance of architectural design detection of intrusions.
|
-
Describe interoperability aspects of various commercial IDS solutions.
|
-
Define and utilize various network based Intrusion Detection Solutions (IDS).
|
-
Detect various exploitation attempts in a network environment.
|
-
Explain intrusion detection and denial of service.
|
-
Describe techniques for gathering intelligence on intrusion detection and the latest tools and techniques used by hackers.
|
-
Define and recognize structured attacks and differentiate from unstructured attacks.
|
-
Explain management issues related to intrusion detection.
|
-
Implement appropriate security measures following risk analysis.
|
-
Implement appropriate security measures to minimize risks from hackers.
|
-
Issue and manage digital certificates.
|